VPN tunnel is UP, but can't ping or telnet through the tunnel

0

Hi,

I have a VPC in AWS, I was able to build a Site-to-site VPN tunnel with a remote ASA router.

AWS subnet: 172.31.32.0/20
Counter-party (ASA side) subnet: 192.168.100.0/24
VPN: vpn-0f651da88e042c69a
VPC: vpc-3ce65157
VPG: vgw-0f245078689fc9788
Customer Gateway: cgw-0f9a72a575d19acc6
Route Table: rtb-1fafd374
EC2: i-0e813ed5a4ab389be (enabled all traffic for the VPN counter-party private subnet 192.168.100.0/24)

Timing out to ping or telnet in either direction. When pinging from remote side to AWS, the remote network engineer did see the traffic went out to AWS, but no reply.

Am I missing anything?

Thanks,
Yan

Edited by: ywang on Nov 23, 2020 12:20 PM

ywang
질문됨 3년 전2263회 조회
2개 답변
0

Hi Yan,
Thanks for writing in.
From what I understand, the VPN is configured in correctly and the ASA is seeing egress traffic towards AWS? If that's the case, the recommended way to troubleshoot issues such as this is via the flow logs. Enabling flow logs for a VPC,subnet or specific ENI's will show what traffic ingresses/egresses the said ENI and prove if traffic has actually made it to AWS or not. If you're not across flow logs/how to setup flow logs, get started at [1]. The key thing to look for in your case is:

a) if traffic is seen in the flow logs from a given source IP (in the 192.168.100.0/24 range) and if the logs show "ACCEPT". If you see a "REJECT" for the said flow, it typically means there's a problem with the security group, routing table, Network access lists to name a few.
b) If you're able to see bi-directional traffic flows in the logs for a given source/destination. If you do not see any traffic from that source, it means that there's a problem with the VPN and traffic has not made it to AWS/This VPC as yet.

For end-to-end troubleshooting, you can also run packet captures on the EC2 instance, the source server/appliance and the ASA simultaneously so that you can trace your traffic all the way.

NOTE: Please refrain from divulging any personal information around your AWS resources including Resource IDs, Public IPs and Security group rules to name a few, since all posts are publicly available indefinitely. If you need pointed guidance, please reach out to us at AWS Support via the Support console.

[1] https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html

Edited by: Vignesh-AWS on Nov 24, 2020 11:38 AM

답변함 3년 전
0

Thanks Vignesh. The remote side fixed the issue by changing from BGP mode to static routing.

Setting up flow log as you suggested helps a lot for troubleshooting.

Yan

ywang
답변함 3년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠